Professional Documents
Culture Documents
More recently, not having visibility into cloud services and mobile devices provides a significant opportunity
for data loss or compromise. Personal cloud storage services, and personal or BYOD mobile devices are
blind spots for security without the use of intrusive (and expensive), specialized products dedicated to
those environments. Relying solely upon point-in-time snapshots of the network can also create blind
spots, or missing devices present between scans. For example, transient laptops that aren’t continuously
connected create blind spots.
Even if unknown devices and services are identified, another concern is prioritization and context.
With limited security resources—both in terms of the personnel available and the tools at your disposal,
it is important to determine the security impact of those assets. Assessing the weaknesses and trust
relationships of an asset provide crucial context about security risk and helps you prioritize assets for
protection. Without that contextual information, there is too much noise for IT to make informed decisions.
| SOLUTION STORIES
Attackers know that the easiest path to compromise your assets Tenable’s library of dashboards provide a lens into the unknown by breaking
is to go after the entry points you don’t know about. While a down detections and the vulnerabilities they present, in the context of your
locked door will keep threats out, it only works when you haven’t greater security program, so you can make informed decisions for effective
left the windows open as well. and rapid response . When communicating the status of your findings,
Assurance Report Cards are an essential tool to report up the chain using
While you are vigilantly watching and diligently securing your known devices business language so that everyone across the organization, especially
and data, these shadow assets are left unpatched and unprotected, just business decisions makers, can see at-a-glance if your organization is
waiting to be hacked; providing that pivotal entry point to move through your achieving your objectives.
network and reach critical assets and sensitive data.
Tenable SecurityCenter Continuous View (SecurityCenter CV) delivers total Bring Unknown Assets Out of
visibility of all known and unknown assets on a network. Tenable’s passive
traffic and event monitoring tools detect all devices, services, and applications the Shadows
in use, and identify associated vulnerabilities so you can quickly and easily You need the right tools to continuously monitor your environment to
determine the relative risk they expose you to. SecurityCenter ActiveSync and detect and identify these shadow assets. Tenable SecurityCenter CV
Mobile Device Management (MDM) integration also enable SecurityCenter provides a comprehensive solution that gives you the visibility and
CV to detect and identify unknown and shadow assets, including transient context you need to protect your network and secure your assets
laptops, personal mobile devices, and rogue cloud applications. When effectively with decisive action.
new mobile devices are detected, Tenable also pulls policy and software
information about the device from integrated MDM systems.
About Tenable
Simply realizing that shadow assets are out there is not enough to protect
Tenable Network Security transforms security technology for the
them and your environment. Security teams need visibility into the posture
business needs of tomorrow through comprehensive solutions that
of these devices and services, in order to reduce the attack surface. As
provide continuous visibility and critical context, enabling decisive
SecurityCenter CV discovers unknown, mobile, and cloud assets, their
actions to protect your organization. Tenable eliminates blind spots,
vulnerability exposure is also assessed to determine which pose a greater
prioritizes threats, and reduces exposure and loss. With more than one
relative risk.
million users and more than 20,000 enterprise customers worldwide,
organizations trust Tenable for proven security innovation. Tenable’s
Tenable SecurityCenter CV secures the IT shadows by bringing
customers range from Fortune Global 500 companies, to the Department
unknown assets to light. When hosts are discovered, it can of Defense, to mid-sized and small businesses in all sectors, including
automatically scan them and distribute reports of what’s present finance, government, healthcare, higher education, retail and energy.
on your network. Transform security with Tenable, the creators of Nessus and leaders in
continuous monitoring, by visiting tenable.com.